SlideShare a Scribd company logo
Operating System What Can We Do?
Sources http://www.protect-me.com/industry_news.html
JitterBugs Attached to a keyboard -- could be a new security threat? Piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet
How does this work? By causing calculated "jitters" in keyboard input while such a program is running, a JitterBug could slightly delay data sent over the network. Certain amounts of delay could represent a one or a zero in each packet that is linked to keyboard use, allowing an attacker to send secret information in otherwise innocuous data without modifying software or initiating any new connections.
What Can We Do? Get rid of keyboards?
Stealing data with iPods Hi-tech thieves are using iPods to download data  Blackberries, mobile phones with in-built storage, data pens and memory sticks that fit onto a key ring can be surreptitiously plugged into a computer port and used to steal bank account details, insurance information or even medical records.
Points Industry analyst Gartner says 70 per cent of security losses are as a result of insider activity.  Protiviti says computer-based crime costs UK businesses up to $540,000 an hour, or an average of more than $1100 a business per year.
iPod Bad? An iPod can easily be configured to behave like a regular hard disk, which is capable of stealing confidential data quickly.  ‘ Podslurping' – Using an iPod to copy corporate data without permission
What Can We DO? 'lock down' ports to stop unwanted peripherals downloading data? ban iPods and other data-downloading equipment?
P2P ( Peer to Peer) P2P Users Beware -- Your Personal Info Could Be Out There Medical records, financial information and router passwords have all popped up on P2P network file shares
What Can We Do? Just say no?
IT Managers Ignore  Removable Media Risk The survey, of 248 IT professionals who had attended the Infosecurity Europe 2006 conference in London  A survey conducted by the Mobile Security Company, revealed that 56% of employees downloaded corporate information onto their memory sticks, up from 31% last year
Things to think on The most popular use of the memory sticks was the storage of corporate data such as contracts, proposals and other business documents  Only 21% secured flashdrives with passwords and encryption 12% of organizations banned them completely from the workplace
Things to think on Removable media is plummeting in price, have soaring memory capacities, and more people are using them at work
What Are We to Do? Companies need to be educated about using them securely Ban their use?
Trojan horses steal  bank details and passwords   Banks in the United Kingdom, Germany and Spain have been targeted by MetaFisher, otherwise known as Spy-Agent and PWS.  After infecting a computer, the Trojan horse waits until the user visits a legitimate bank Web site, and then injects malicious HTML into certain fields there.
Points What is a Trojan Horse? The attackers attempt to place the Trojan on a computer using an exploit for the Windows Meta File flaw in Microsoft's Internet Explorer The potential victim must visit a malicious Web site to infect their system, and attackers may use e-mails to direct them there.
What Do We Do? Don’t allow users to download executable programs?

More Related Content

PDF
Malta Economic Update 06 2008 - isec interview
PPTX
Data Security Breach: The Sony & Staples Story
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PPTX
What Cybercriminals Want: Company Data – by United Security Providers
PPTX
Chapter 17 a fraud in e commerce Jen
PPTX
E commerce fraud chapter 17 B Ahmed
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PDF
How to Find Security Breaches Before They Sink You
Malta Economic Update 06 2008 - isec interview
Data Security Breach: The Sony & Staples Story
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
What Cybercriminals Want: Company Data – by United Security Providers
Chapter 17 a fraud in e commerce Jen
E commerce fraud chapter 17 B Ahmed
Updated Cyber Security and Fraud Prevention Tools Tactics
How to Find Security Breaches Before They Sink You

What's hot (20)

PPTX
What Makes Web Applications Desirable For Hackers
PDF
Target Breach Analysis
PPTX
Hacking ppt
PDF
Dw communication
PDF
How to safe your company from having a security breach
PDF
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
PPT
PPT
Hackers
PPTX
Cyber security
PDF
AI for CyberSecurity
PDF
Internet of Things - A Different Kind of Scary v2
PPTX
Protect the Unexpected
PPTX
Security Awareness Presentation Fall 2013
PDF
The good, the bad and the ugly of the target data breach
DOCX
Final report ethical hacking
PPTX
Online privacy & security
DOCX
Final report ethical hacking
PPTX
LockheedPreview
PDF
A Guide to Internet Security For Businesses- Business.com
PPT
Computer crime
What Makes Web Applications Desirable For Hackers
Target Breach Analysis
Hacking ppt
Dw communication
How to safe your company from having a security breach
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
Hackers
Cyber security
AI for CyberSecurity
Internet of Things - A Different Kind of Scary v2
Protect the Unexpected
Security Awareness Presentation Fall 2013
The good, the bad and the ugly of the target data breach
Final report ethical hacking
Online privacy & security
Final report ethical hacking
LockheedPreview
A Guide to Internet Security For Businesses- Business.com
Computer crime
Ad

Viewers also liked (16)

PPTX
Repositorios web
PDF
Examination
PDF
Mobile Websites: No Longer An Option
PPTX
The Economic Development in the African Continent
PPTX
El cuatro instrumento musical
PPTX
PPTX
brics monetary_policy_presentation
DOCX
PPTX
Spira team
DOCX
Judaizam i hriscanstvo
PPTX
Macro Economic Environment of South Africa
PDF
Contexto escolar em LIBRAS
PPT
Moldova în timpul lui stefan cel mare grupa 4
PPTX
BRICS Nations
PDF
Le marketing de contenu de la startup, selon Azendoo
PPTX
Design of pile cap
Repositorios web
Examination
Mobile Websites: No Longer An Option
The Economic Development in the African Continent
El cuatro instrumento musical
brics monetary_policy_presentation
Spira team
Judaizam i hriscanstvo
Macro Economic Environment of South Africa
Contexto escolar em LIBRAS
Moldova în timpul lui stefan cel mare grupa 4
BRICS Nations
Le marketing de contenu de la startup, selon Azendoo
Design of pile cap
Ad

Similar to Jitter Bugslec (20)

PPT
Ch02 System Threats and Risks
PPSX
IT Security Seminar Cougar CPS
PDF
Network monitoring white paper
PPT
Merit Event - Closing the Back Door in Your Systems
KEY
Malware mitigation
PPTX
Computer Security and Ethics
PDF
lesson2-safeandresponsibleuseofict-210806120854.pdf
PPTX
HELE 4 Lesson 2: Safe and Responsible Use of ICT
PPTX
Security Awareness 101
PPT
Data security
PPT
11 Computer Privacy
PDF
Is your data at risk? Why physical security is insufficient for laptop computers
PPT
091005 Internet Security
PDF
Cyber Malware Programs And The Internet
PDF
Meeting the Cybersecurity Challenge
PPTX
Protecting Yourself From Data and Identity Theft
PPTX
Privacy, Security
PPT
Top Five Internal Security Vulnerabilities
PDF
4 threatsandvulnerabilities
PPT
Computer security and_privacy_2010-2011
Ch02 System Threats and Risks
IT Security Seminar Cougar CPS
Network monitoring white paper
Merit Event - Closing the Back Door in Your Systems
Malware mitigation
Computer Security and Ethics
lesson2-safeandresponsibleuseofict-210806120854.pdf
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Security Awareness 101
Data security
11 Computer Privacy
Is your data at risk? Why physical security is insufficient for laptop computers
091005 Internet Security
Cyber Malware Programs And The Internet
Meeting the Cybersecurity Challenge
Protecting Yourself From Data and Identity Theft
Privacy, Security
Top Five Internal Security Vulnerabilities
4 threatsandvulnerabilities
Computer security and_privacy_2010-2011

Recently uploaded (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
A novel scalable deep ensemble learning framework for big data classification...
1 - Historical Antecedents, Social Consideration.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
Univ-Connecticut-ChatGPT-Presentaion.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
TLE Review Electricity (Electricity).pptx
Zenith AI: Advanced Artificial Intelligence
Enhancing emotion recognition model for a student engagement use case through...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Mushroom cultivation and it's methods.pdf
MIND Revenue Release Quarter 2 2025 Press Release

Jitter Bugslec

  • 3. JitterBugs Attached to a keyboard -- could be a new security threat? Piggyback onto network connections to discreetly send passwords and other sensitive data over the Internet
  • 4. How does this work? By causing calculated "jitters" in keyboard input while such a program is running, a JitterBug could slightly delay data sent over the network. Certain amounts of delay could represent a one or a zero in each packet that is linked to keyboard use, allowing an attacker to send secret information in otherwise innocuous data without modifying software or initiating any new connections.
  • 5. What Can We Do? Get rid of keyboards?
  • 6. Stealing data with iPods Hi-tech thieves are using iPods to download data Blackberries, mobile phones with in-built storage, data pens and memory sticks that fit onto a key ring can be surreptitiously plugged into a computer port and used to steal bank account details, insurance information or even medical records.
  • 7. Points Industry analyst Gartner says 70 per cent of security losses are as a result of insider activity. Protiviti says computer-based crime costs UK businesses up to $540,000 an hour, or an average of more than $1100 a business per year.
  • 8. iPod Bad? An iPod can easily be configured to behave like a regular hard disk, which is capable of stealing confidential data quickly. ‘ Podslurping' – Using an iPod to copy corporate data without permission
  • 9. What Can We DO? 'lock down' ports to stop unwanted peripherals downloading data? ban iPods and other data-downloading equipment?
  • 10. P2P ( Peer to Peer) P2P Users Beware -- Your Personal Info Could Be Out There Medical records, financial information and router passwords have all popped up on P2P network file shares
  • 11. What Can We Do? Just say no?
  • 12. IT Managers Ignore Removable Media Risk The survey, of 248 IT professionals who had attended the Infosecurity Europe 2006 conference in London A survey conducted by the Mobile Security Company, revealed that 56% of employees downloaded corporate information onto their memory sticks, up from 31% last year
  • 13. Things to think on The most popular use of the memory sticks was the storage of corporate data such as contracts, proposals and other business documents Only 21% secured flashdrives with passwords and encryption 12% of organizations banned them completely from the workplace
  • 14. Things to think on Removable media is plummeting in price, have soaring memory capacities, and more people are using them at work
  • 15. What Are We to Do? Companies need to be educated about using them securely Ban their use?
  • 16. Trojan horses steal bank details and passwords Banks in the United Kingdom, Germany and Spain have been targeted by MetaFisher, otherwise known as Spy-Agent and PWS. After infecting a computer, the Trojan horse waits until the user visits a legitimate bank Web site, and then injects malicious HTML into certain fields there.
  • 17. Points What is a Trojan Horse? The attackers attempt to place the Trojan on a computer using an exploit for the Windows Meta File flaw in Microsoft's Internet Explorer The potential victim must visit a malicious Web site to infect their system, and attackers may use e-mails to direct them there.
  • 18. What Do We Do? Don’t allow users to download executable programs?